tle-ict-computer hardware servicing grade 10 tg

Upload: hari-ng-sablay

Post on 10-Mar-2016

80 views

Category:

Documents


6 download

DESCRIPTION

TLE-ICT-Computer Hardware Servicing Grade 10 TG

TRANSCRIPT

  • GOVERNMENT PROPERTY

    NOT FOR SALE

    ALLOTTED TO

    District/ School: _________________________________________

    Division _________________________________________________

    First Year of Use: _________________________________________

    Source of Fund (Year included):__________________________

    Basic Education Curriculum TECHNOLOGY AND LIVELIHOOD

    EDUCATION

    Information and Communications

    Technology

    Teachers Guide

    Computer Hardware Servicing

  • ii

    Department of Education

    Republic of the Philippines

    Computer Hardware Servicing Grade 10 Learners Material First Edition, 2013 ISBN: ___________ Republic Act 8293, section 176states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Br. Armin A. Luistro FSC Undersecretary: Dina S. Ocampo, Ph.D. Assistant Secretary: Lorna Dig Dino, Ph.D.

    Printed in the Philippines by ____________

    Department of Education-Instructional Materials Council Secretariat (DepEd-IMCS)

    Office Address: 2nd Floor Dorm G, Philsports Complex, Meralco Avenue,

    Pasig City, Philippines 1600

    Telefax: (02) 634-1054, 634-1072

    E-mail Address: [email protected]

    Development Team of the Learners Material

    Authors: Rosalie P. Lujero

    Teacher III / School ICT Coordinator Dasmarias East National High School

    Ronaldo V. Ramilo

    Education Program Specialist Division of Tanauan

    Michael Angelo C. Gatchalian Teacher III / School ICT Coordinator Dagupan City National High School

    Editors: Joemar A. Garraton

    Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas

    Illustrator and Layout Artists:

    Subject Specialist: Owen M. Milambiling

    Management Team: Dr.Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Marias,

    Dr. Jose D. Tuguinayo, Jr.

  • iii

    TABLE OF CONTENTS

    Module 1: PERSONAL ENTREPRENUERIAL COMPETENCIES (PECs)

    Grade Level Standard.. 1

    Content Standard. 1

    Performance Standard.. 1

    Learning Competencies ..

    Introduction

    1

    1

    Objectives.. 2

    Presentation of Content ..

    Introduction

    Objectives

    Pre- Assessment

    Guide Question

    Learning Goals and Target

    Know...

    2

    3

    Process .

    Reflect and Understand ...

    3

    4

    Transfer .. 4

    Feedback

    References .

    4

    4

    Module 2: ENVIRONMENT AND MARKET (EM)

    Grade Level Standard.. 6

    Content Standard... 6

    Performance Standard .. 6

    Learning Competencies .....

    Introduction

    Objectives

    Presentation of Content

    Introduction

    Objectives

    Pre- Assessment

    Guide Question

    Learning Goals and Target

    Know .

    Product Development

    Concept of Developing Product

    Finding Value

    Innovation

    6

    6

    7

    7

    8

  • iv

    Unique Selling Proposition

    Process.

    Reflect and Understand ...

    Transfer...

    Know ....

    Generating Ideas for Business

    Key Concept of Selecting a business Idea

    Branding

    Process .....

    Reflect and Understand ......

    Transfer ...

    Feedback .

    References ..

    9

    9

    9

    9

    10

    10

    10

    10

    10

    Module 3: CONFIGURING COMPUTER SYSTEMS AND NETWORK

    Grade Level Standard .

    Content Standard .

    Performance Standard

    Introduction ..

    Learning Competencies

    Learning Competencies / Objectives -

    Pre-Diagnostic / Assessment .

    Lesson 1. Plan and Prepare for Configuration

    What to Know -

    Safety Procedures Fire Safety Guidelines

    Prepare Tools Used for Configuration

    Procedure in Using Computer System

    Configuration Tools

    What to Process ..

    Peer to Peer Activity

    MS Configuration Command Classification

    Applet Grouping

    What to reflect / Understand .

    Research and Investigation

    What to Transfer ..

    Role Playing

    Oral Presentation

    12

    12

    12

    12

    13

    13

    14

    18

    18

    19

    19

    20

    21

    22

    23

    25

    25

    26

  • v

    Windows Registry Backup and Recovery

    Lesson 2. Configure Computer System and Network What to Know .

    What to Know

    Safety Precautions related to Networks

    Networking Devices, Media and Connector

    Internet Protocols

    Peer- to- peer and Client/server network Category Rating

    Network Security

    File and Printer Sharing

    What to Process

    Criss-Cross Puzzle

    Protocols Worksheet

    Identifying IP Address Classes

    Comparison Activity

    Short Quiz

    Essay Writing

    What to Reflect / Understand .

    Video Presentation

    Online Video tutorials

    Peer to peer study

    Research Firewalls Activity

    Read and Examine

    What to Transfer

    Create Your Own Ethernet Cable

    Configure Ethernet NIC to use DHCP

    Configure Wireless Router

    Hands- on Activity

    Configure Windows XP Firewall

    Share a folder, Printer and Set Permissions

    Lesson 3. Inspect and Test Configured Computer System

    And Network ..

    What to Know

    Safety Precautions

    Guidelines for Testing Configured Computer

    What to Process...

    What to Reflect / Understand ..

    What to Transfer.

    Test the Wireless NIC

    28

    28

    28

    28

    28

    29

    29

    29

    29

    30

    30

    31

    31

    32

    32

    33

    34

    35

    36

    38

    40

    41

    41

    42

    44

    48

    50

    51

    55

    62

    62

    63

    63

    63

    63

  • vi

    Accomplishing a Technical Report

    Summative Test .

    Feedback

    References

    Module 4: MAINTAINING COMPUTER SYSTEMS AND NETWORK

    Content Standard .

    Performance Standard

    Learning Competencies .

    Objectives...

    Pre Diagnostic / Assessment

    Lesson 1. Procedures in Planning and Conducting Maintenance

    What to Know..

    Follow OHS Procedures Plan on how to maintain computer system and networks

    Diagnoses faulty computer and network systems Material Safety Data Sheet (MSDS)

    What to Process.

    Slide Show

    Investigate and Interpret

    Internet Research

    Network Layout

    What to Reflect / Understand.

    Pictorial Tour

    Investigative Report

    Read and Study

    Critical Review

    What to Transfer..

    Video Demo

    Magazine Article

    Computer Specifications

    Computer Shop Network Layout

    Lesson 2. Maintain Network Systems..

    What to Know..

    Procedure on how to maintain Computer

    System and Networks

    Identify Faulty computer systems

    Test normal functions of Computer System

    Perform Repair

    Adhere to the recommended schedule and

    techniques in maintaining and cleaning computer system

    66

    66

    67

    70

    73

    73

    73

    73

    74

    74

    76

    76

    76

    76

    77

    77

    84

    84

  • vii

    Respond to sudden breakdown of computer systems

    What to Process.

    Essay Activity

    Critical review

    Ways to Improve your computers performance

    Duplication

    What to Reflect / Understand.

    Research and investigate

    Slide show presentation

    Evaluating your needs

    What to Transfer

    Role Playing

    Video Tutorials

    Defragmentation Issue

    Online Review

    Concept Mapping

    How to Scan your Flash Drive

    Deleting Temporary Files

    Lesson 3. Maintain Network Systems

    What to Know

    Follow OHS Procedures

    Run the burn- in test on computer system

    What to Process.

    Maintain Inspection Checklist

    Performing Immediate Burn- in Testing

    What to Reflect / Understand.

    Video Tutorial

    What to Transfer .

    Weekly Maintenance Checklist

    Lesson 4. Inspect and Test configured/repaired computer Systems and

    networks..

    What to Know

    Follow OHS Procedures

    Maintain Computer systems and networks to ensure

    safe operations

    Computer communications

    Run or conduct computer to computer

    communications

    Connect computer systems to the internet

    87

    88

    90

    95

    95

    95

    96

    96

    97

    97

  • viii

    Computer systems and network checked to ensure

    safe operation

    Prepare Technical reports

    What to Process ..

    Experiment and Demonstrate

    What to Reflect / Understand.

    Video Tutorial

    Practicing TCP/IP Networking Skills

    Video Tutorial

    Computer Item Enumeration

    What to Transfer .

    Schedule and Techniques in Maintaining Systems

    Network Checking

    Network Connection Demo

    Creating Hardware- Software Tools Report

    Summative Test .

    Feedback

    References

    What to Transfer..

    98

    103

    104

    105

    105

    109

  • 1

    K to12 BASIC EDUCATION CURRICULUM Information and Communications Technology

    COMPUTER HARDWARE SERVICING Grade 10

    GRADE 10 MODULE 1 Personal Entrepreneurial Competencies (PECs)

    Teachers Guide

    Quarter I 4 hrs.

    Grade Level Standard

    This is a specialization course which leads to Computer Hardware Servicing

    National Certificate Level II (NC II). It covers two (2) core competencies that a

    Grade 10 Technology and Livelihood Education (TLE) student ought to possess,

    namely: 1) communicate effectively using the English language and 2) deliver

    quality customer service.

    The preliminaries of this specialization course include the following: 1) discussion on the relevance of the course, 2) explanation of key concepts relative to the course, and 3) exploration of career opportunities.

    Content Standard

    The learner demonstrates understanding of ones Personal Entrepreneurial Competencies in Computer Hardware Servicing.

    Performance Standard

    The learner independently creates a plan of action that strengthens and or

    further develops his/her PECs in Computer Hardware Servicing.

    Learning Competencies

    Develop and strengthen PECs needed in Computer Hardware Servicing.

    I. Introduction

    This teachers guide will lead you to effectively and efficiently teach

    Module 1. Moreover, this will guide you in determining relevant and appropriate

    teaching techniques and strategies that will fit the learning needs and demands of

    the learners to make them best understand and appreciate the importance of

  • 2

    entrepreneurship and the entrepreneurial competencies related to Computer

    Hardware Servicing.

    This module will also provide learners an opportunity to know that

    individuals possess different PECs. These PECs include characteristics, attributes,

    lifestyles, skills, or traits. Likewise, when one aligns these competencies with the

    competencies of successful practitioners or entrepreneurs, he or she will be ready

    to face the experiences of starting a business or being employed.

    Moreover, the module is designed to stimulate the learners to think about

    entrepreneurship and its role in the business community and in economic and

    social development.

    II. Objectives

    With your assistance and the guidance of this module, learners are

    expected to understand the underlying principles and concepts of PECs,

    particularly in:

    - identifying areas for improvement, development, and growth,

    - aligning learners PECs according to their business or career choice, and

    - creating a plan of action that ensures success in their business or career

    choice.

    III. Presentation of Content

    Introduction

    Guide learners in appreciating and understanding PECs for them to be

    successful in business or in the workforce by sharing inspiring real-life

    stories of successful businessman and or well-known employees in the field

    of Computer Hardware Servicing in the province.

    Explain to learners the importance of assessing their PECs.

    Guide learners in understanding the importance of entrepreneurs and

    entrepreneurship.

    Objectives

    Guide learners in identifying and understanding the objectives of Module 1.

    Pre-Assessment

    Use the sample pre-assessment test available in the learners materials or

    craft a comprehensive teacher-made test to assess learners prior

    knowledge and skills in PECs.

    Evaluate the result of the pre-assessment and prepare a plan of action to

  • 3

    strategically address the learning needs and requirements of the learners.

    Guide Questions

    Have learners actively perform task 2, and let them share their answers and

    relevant experiences with the class.

    Process learners understanding of the guide questions presented on task 2.

    Learning Goals and Target

    Help learners utilize available technologies / resources in planning their own learning goals and targets as reflected on page 4.

    Group Activity

    Group the learners, then ask them perform task 3. Let them share their

    thoughts with the class.

    Process learners understanding and guide them in arriving at a relevant and

    acceptable generalization.

    IV. Know, Process, Reflect and Understand, and Transfer

    Know

    Discuss / present the importance of assessing personal entrepreneurial

    competencies (PECs) and skills vis--vis a practicing entrepreneur or

    employee; provide an actual example of an entrepreneur or employee

    existing in your province.

    Expand learners curiosity by asking essential questions on the important

    characteristics / traits / attributes, and skills of a good entrepreneur.

    Assist / Guide learners in understanding the entrepreneurial competencies

    (characteristics, traits, attributes) and skills of a good entrepreneur.

    Have an appropriate, relevant, and timely learning activity for the learners to

    appreciate the best entrepreneurial competencies.

    Assess learners knowledge and skills on understanding of topic. Use the

    result of the pre-assessment to improve their learning.

    Process

    Ask the learners accomplish task 4 (PECs Checklist) on page 8-9. Let them

    make their interpretation or personal insights based on the accomplished

    task.

    Facilitate student-to-student interactions and process learners

    understanding.

    Reflect and Understand

    Deepen learners understanding of PECs by guiding them in accomplishing

  • 4

    task 5 (Interview) on page 9-12.

    Facilitate appropriate learning activities to finish the task.

    Encourage learners to report their accomplishments to the class.

    Process learners understanding.

    Transfer

    Assist learners in individually accomplishing task 6 (Preparation of a Plan of

    Action) on page 12. Let them craft their own plan of action intelligently. Have

    learners present this in class.

    Process their understanding.

    Guide learners in answering the essential questions presented in task 7 on

    page 13.

    Have learners share their answers with the class, and then process their

    understanding.

    Provide learners more concrete example and enrichment activities to further

    deepen their understanding about PECs and its importance in day-to-day

    living as future entrepreneurs or employees.

    Provide learners applicable activities whereby they can transfer to the

    community what they have learned.

    Let learners use available resources in the community to accomplish the

    task.

    V Feedback

    Pre / Post Assessment

    1. E 6. B

    2. K 7. C

    3. H 8. I

    4. A 9. D

    5. J 10. F

    VI References

    1. Module 5, Project EASE, Effective and Affordable Secondary Education

    2. http://www.entrepreneur.com/article/77408#ixzz2twpYG49A

    3. http://www.thetimes100.co.uk/theory/theory--opportunities-constraints-

  • 5

    business-environment--165.php#ixzz1PVjUuaWu

    4. http://www.thetimes100.co.uk/theory/theory--constraints--421.php#ixzz1PVki8a36

    5. http://www.thetimes100.co.uk/theory/theory--constraints-on-production--303.php#ixzz1PVkyDy8k

    6. http://www.thetimes100.co.uk/theory/theory--production-and-resource-requirements--354.php#ixzz1PVlGG7zv

    7. http://www.thetimes100.co.uk/theory/theory--nature-and-role-of-marketing--245.php#ixzz1PVlc88gR

  • 6

    K to12 BASIC EDUCATION CURRICULUM Information and Communications Technology

    COMPUTER HARDWARE SERVICING (SPECIALIZATION)

    GRADE 10 MODULE 2 Environment and Market (EM)

    Teachers Guide

    Quarter I 4 hrs.

    Grade Level Standard

    This is a specialization course which leads to Computer Hardware

    Servicing National Certificate Level II (NC II). It covers two (2) core

    competencies that a Grade 10 Technology and Livelihood Education (TLE)

    student ought to possess, namely: 1) communicate effectively using the English

    language and 2) deliver quality customer service.

    The preliminaries of this specialization course include the following: 1) discussion on the relevance of the course, 2) explanation of key concepts relative to the course, and 3) exploration on career opportunities.

    Content Standard

    The learner demonstrates understanding of environment and market in Computer Hardware Servicing in ones province.

    Performance Standard

    The learner independently creates a business vicinity map reflective of

    potential market in Computer Hardware Servicing in a province.

    Learning Competencies

    Develop a quality and marketable product or service in Computer Hardware Servicing

    Select a business idea based on the criteria and techniques set

    Develop a brand for the product

    V. Introduction

    People who aspire to start a business need to explore the economic,

  • 7

    cultural, and social conditions prevailing in an area. Needs and wants of the

    people in a certain area that are not met may be considered as business

    opportunities. Identifying the needs of the community, its resources, available

    raw materials, skills, and appropriate technology can help a new entrepreneur in

    seizing a business opportunity.

    To be successful in any kind of business venture, potential entrepreneurs

    should always look closely at the environment and market. They should always

    be watchful on the existing opportunities and constraints. The opportunities in

    the business environment are those factors that provide possibilities for a

    business to expand and make more profits. Constraints, on the other hand, are

    those factors that limit the business to grow, hence reduce the chance of

    generating profit. One of the best ways to evaluate the opportunities and

    constraints is to conduct Strengths, Weakness, Opportunities and Threats

    (SWOT) Analysis.

    VI. Objectives

    With your assistance and guidance in facilitating this module,

    learners are expected to understand the underlying principles and concepts

    of environment and market more particularly in:

    - identifying what is of value to the customer,

    - identifying the customer to sell to,

    - explaining what makes a product unique and competitive,

    - applying creativity and innovative techniques to develop marketable

    product, and

    - employing a unique selling proposition (USP) to the product and or

    service.

    VII. Presentation of Content

    Introduction

    Using appropriate activities, lead learners in giving value to environment

    and market and its implication to be successful in a business related to

    Computer Hardware Servicing.

    Guide learners in understanding the importance of environment and

    market; likewise, lead them in appreciating the value of SWOT Analysis.

    Provide relevant, appropriate, and meaningful examples of SWOT

    Analysis pertaining to Computer Hardware Servicing.

    Help learners in presenting the importance of assessing their immediate

  • 8

    environment and market pertaining to Computer Hardware Servicing.

    Using your processing and questioning skills, guide learners in coming up

    with a generalization about the environment and market and its

    relationship to a successful field of Computer Hardware Servicing.

    Objectives

    Guide learners in identifying and understanding the objectives of this

    module.

    Pre-assessment

    Use the sample pre-assessment test available in the learners materials

    or craft a comprehensive teacher-made test to assess learners prior

    knowledge and skills in environment and market.

    Evaluate the result of the pre-assessment and prepare a plan of action to

    strategically address the learning needs and requirements of the

    learners.

    Guide Questions

    Ask learners to perform task 2 and guide them in presenting their

    answers to the class.

    Process learners responses and guide them in making appropriate

    generalizations.

    Learning Goals and Target

    Help learners in planning their own learning goals and target as reflected

    on page 18.

    Provide enrichment activities and guide them in analyzing available

    resources and technology in the community to be used in accomplishing

    their learning goals and targets.

    VIII. Know, Process, Reflect and Understand, and Transfer

    Product development

    Know

    Discuss product development, concept of developing a product,

    finding value, innovation, unique selling proposition, and its

    relationship to environment and market and business at large.

    Let learners participate in the discussion on the aforementioned

    topics. Assist and/or guide learners in presenting their ideas and

    relevant experiences.

    Design varied levels of learning activities for the learners to better

  • 9

    understand the topics related above.

    Guide learners in reflecting on the importance of product

    development, concept of developing a product, finding value,

    innovation, and unique selling proposition.

    Design an assessment to evaluate learners knowledge, skills, and

    understanding of the previous topics.

    Use the result of the assessment in designing / developing learning

    activities that will enrich learners understanding.

    Process

    Guide learners in accomplishing task 3 on pages 24 to 25. Let them

    conduct a research by interviewing a successful entrepreneur or

    practitioner within the province.

    Have learners present their research to the class. Process their

    understanding in relation to the objectives of this module.

    Reflect and Understand

    Inspire learners to deepen their understanding about the environment

    and market by carefully watching the videos related to the prescribed

    topics on task 4 on page 25.

    After watching the videos, let them prepare a comprehensive

    narrative report on the topics they watched.

    Encourage learners to present their accomplishments to the class.

    Process learners understanding in relation to the objectives of this

    module.

    Transfer

    Guide learners in developing concepts for their own product or service

    as reflected on task 5 on page 26.

    Assist learners in analyzing and utilizing available resources in

    developing their concept of their own product or service.

    Evaluate learners output by referring to teacher-made rubrics which

    is aligned to the performance standards.

    Let learners eloquently share and present their output with the class.

    Lead learners in reflecting on the importance of product

    conceptualization.

    Generating Ideas for Business

    Know

    Let learners read and understand topics related to generating ideas

  • 10

    for business, selecting a business idea, and branding.

    Let learners undergo varied levels of learning activities to better

    appreciate the importance of generating ideas for business, selecting

    a business idea, and branding.

    Process learners understanding relative to the objectives of this

    module.

    Process

    Lead learners in reflecting on their SWOT Analysis and its importance

    in generating business ideas by engaging them in learning

    opportunities for interaction with others outside the classroom and

    with the use of technology.

    Instruct learners to enrich their knowledge on SWOT Analysis by

    conducting researches.

    Provide an appropriate type of assessment to evaluate learners

    understanding of the SWOT Analysis. Use the result of the

    assessment to craft more appropriate and productive learning

    activities.

    Assist learners in performing task 6 (SWOT Analysis).

    Evaluate / Assess learners output and check it against the objectives

    of this module.

    Reflect and Understand

    Let learners work on an independent learning activity or cooperative

    learning (ICL) in accomplishing task 7 (Extra Readings and Video

    Viewing) on page 33.

    Assist learners in presenting their output. Assess the evidence of

    learning and provide useful input to improve their output.

    Transfer

    Have learners prepare task 8 (Designing a Logo). Assist learners in

    accomplishing this task by letting them adhere to their real life

    experience.

    Assess learners output using teacher-made rubrics following the

    standards and objectives of this module.

    Have learners prepare task 9 (Making My Own Vicinity Map). Guide

    learners in creating their own vicinity map reflective of potential

    market in computer technician in your province. Ask them to present

    their output and process their understanding by asking relevant and

    essential questions.

  • 11

    Assess learners output using teacher-made rubrics following the

    standards and objectives of this module.

    Assess learners output using teacher-made rubrics following the

    standards and objectives of this module.

    V Feedback

    Pre / Post Assessment

    6. D 6. D

    7. C 7. B

    8. A 8. C

    9. B 9. D

    10. A 10. D

    VI References

    8. Module 5, Project EASE, Effective and Affordable Secondary Education

    9. http://www.entrepreneur.com/article/77408#ixzz2twpYG49A

    10. http://www.thetimes100.co.uk/theory/theory--opportunities-constraints-business-environment--165.php#ixzz1PVjUuaWu

    11. http://www.thetimes100.co.uk/theory/theory--constraints--421.php#ixzz1PVki8a36

    12. http://www.thetimes100.co.uk/theory/theory--constraints-on-production--303.php#ixzz1PVkyDy8k

    13. http://www.thetimes100.co.uk/theory/theory--production-and-resource-requirements--354.php#ixzz1PVlGG7zv

    14. http://www.thetimes100.co.uk/theory/theory--nature-and-role-of-marketing--245.php#ixzz1PVlc88gR

  • 12

    K to12 BASIC EDUCATION CURRICULUM Information and Communications Technology

    COMPUTER HARDWARE SERVICING (SPECIALIZATION)

    Module 3 Configuring computer systems and network

    Quarter 1-2 60 hrs

    Grade Level Standard

    Information and Communication Technology (ICT) is one of the four (4) components of Technology and Livelihood Education (TLE). One of the courses offered is Computer Hardware Servicing (CHS). This course covers Process and Delivery (PD) which consists of the core competencies that a Grade 10 student ought to possess namely: plan and prepare for configuration, configure computer systems and networks and inspect and test configured computer system and network.

    Content Standard

    The learner demonstrates understanding of the basic concepts and underlying theories in configuring and maintaining computer systems and networks.

    Performance Standard

    The learner independently demonstrates competencies in configuring and maintaining computer systems and networks as prescribed in the TESDA Training Regulations.

    I - Introduction

    The primary purpose of CHS is to provide the learners with the knowledge and skills that will help them become computer hardware technicians. In this year level, learners / trainee should be competent, knowledgeable and skillful in: (1) planning and preparing for configuration; (2) configuring computer systems and network; and (3) inspecting and testing the configured computer systems and network.

    . This curriculum document shall assist and guide the teachers/instructor

    to effectively teach the content of the Grade 10 Learning module, assess learners knowledge and skills, process learners understanding, and evaluate the learners evidences of learning.

  • 13

    II - Learning Competencies

    The competencies expressed as learning outcomes in this teaching guide are the exact competencies that will be used to assess the learners / trainees for them to secure COC or NC in Computer Hardware Servicing. This teaching guide would allow teachers / instructors to strategically teach the competencies spread out in the module; guide the learners in performing the activities; process learners understanding; and assist the learners in applying what they have learned to an entirely new context.

    Utilizing effective teaching methodology and strategies suitable to the learning needs and requirements of the learners, the following are the competencies that should be mastered by learners / trainees after finishing this module.

    Lesson 1. Plan and prepare for configuration

    Follow OHS in planning and preparing for configuration of computer

    systems and networks

    Prepare computer systems, tools, devices, equipment and materials

    Check computer systems and networks configuration against specified

    requirements

    Identify the procedures in using the tools and equipment

    Lesson 2. Configure computer systems and networks

    Follow OHS procedures in configuring computer systems and

    networks

    Inspect networking devices, media and connectors

    Create cross-over and straight-through cables

    Assign IP address to clients and servers

    Configure the assigned IP address to clients and servers

    Enable network security to the computer systems

    Configure file and printer sharing

    Lesson 3. Inspect and test configured computer systems and networks

    Follow OHS procedures in testing systems and networks

    Test computer systems and networks in accordance with the job

    requirements

    Accomplish technical reports on the tests conducted

  • 14

    III Pre / Post Assessment

    Prepare a comprehensive pre / post assessment tool to evaluate learners knowledge and skills.

    Guide learners in assessing their knowledge and skill using: A. Paper and pencil test on pages 38- 41 of Learning Module

    General Directions: Read the items very carefully. Write your answer on a

    clean sheet of paper.

    A. Paper and Pencil Test

    General Directions: Read the items very carefully. Write your answer on a

    clean sheet of paper.

    Test I. True or False

    Directions: Write TRUE if the proceeding statement is correct and FALSE if

    otherwise.

    _______1. A safe workplace is clean, organized and well- lit.

    _______2. One must unplug the power from the source before opening a

    case and performing services.

    _______3. It is a best practice that a fire extinguisher and first aid kit be

    available in the workplace.

    _______4. You are allowed to open the power supply or a monitor.

    _______5. You can bring food and drinks inside the laboratory.

    _______6.The key to a well-tuned computer system is the proper

    configuration.

    _______7. Boot log stores all information from the boot process.

    _______8. Registry is a collection of database of configuration of database of

    configuration in Windows Operating System.

    _______9. The shortcut of Microsoft Configuration is Ipconfig.

    _______10. Configuration is the way a system is set up.

    Test II. Multiple Choice

    Direction: Write the letter of the correct answer.

    1. What boot configuration utility allows setting the programs that will run

    at startup?

    a. Ipconfig c. msconfig

    b. regedit d. dxdiag

  • 15

    2. What application allows you to edit the registry?

    a. Ipconfig c. msconfig

    b. regedit d. dxdiag

    3. Which of the following enables you to test sound and graphics output?

    a. Ipconfig c. msconfig

    b. regedit d. dxdiag

    4. Which of the following is an applet that controls the look of windows?

    a. Appearance and themes c. Performance and Maintenance

    b. Network and Internet d. Sounds, speech and audio

    5. Which of the following applets does not belong to Performance and

    maintenance category?

    a. Administrative tool c. Power Options

    b. Automatic Updates d. System

    6. Which of the following is a wizard used to configure MS Windows for

    vision, hearing and mobility needs?

    a. Accessibility Option c. Sounds, speech and audio

    b. Security Center d. User Accounts

    7. A tab in direct X Diagnostic tool that displays your current audio

    settings.

    a. Input c. Sound

    b. Music d. System

    8. Which of the following networking cable category is the most

    commonly used?

    a. Cat3 c. Cat 5 and 5e

    b. Cat 5 d. Cat 6

    9. What copper-cored cable is surrounded by a heavy shielding?

    a. coaxial cable c. optical fiber

    b. fiber optics d. twisted pair

    10. What Ethernet cable is used to connect two devices directly?

    a. cross- over c. both A and B

    b. straight through d. none of the options

    11. Which of the following is a number used to identify a device on a

    network?

  • 16

    a. Default gateway c. IP address

    b. DNS Server d. subnet mask

    12. In which of the following IP address classes does 192.168.1.105

    belong?

    a. Class A c. Class C e. Class E

    b. Class B d. Class D

    13. What command is used to test the ability of the source computer to

    reach a specified destination computer?

    a. Ipconfig c. Ping

    b. Msconfig d. Regedit

    14. What do you call an approach to computer networking where all

    computers show equivalent responsibility for processing data?

    a. Client server c. Peer to client

    b. Peer to peer d. None of the options

    15. Which of the following is an example of a Class A subnet mask?

    a. 255.0.0.0 c. 255.255.255.0

    b. 255.255.0.0 d. 255.255.255.255

    Test III. Matching Type

    Directions: Match the definition in Column A with the networking terminologies

    in Column B.

    A B 1. Copper cabling used for

    telephone communication 2. Standard Ethernet cable 3. Cable that has a very thin

    core 4. Cable that has a thicker core 5. Tool used for crimping RJ45 6. Connector for Cat 5e cable 7. Set of rules 8. Indicates the network portion

    of an IP address 9. Command used find out the

    IP address 10. Glass or plastic conductor

    a. Crimping tool b. Cross- over c. Fiber- optic d. Ipconfig e. Multi- mode f. Ping g. Protocol h. RJ45 i. Single- mode j. Straight through k. Subnet mask l. Twisted pair

  • 17

    Test IV. ACRONYMS

    Direction: Give the complete meaning of the following acronyms.

    1. UTP

    2. STP

    3. IP

    4. TCP /IP

    5. HTTP

    6. FTP

    7. SSH

    8. IMAP

    9. SMTP

    10. DHCP

    11. DNS

    12. TTL

    13. LAN

    14. VPN

    15. NIC

    B. Skills test pages 41- 42 of Learning Module

    Configuration Skills

    Directions: Below is a matrix containing the most important skills that one

    must have to configure computer systems and networks successfully. Check

    () the appropriate column which describes the level of your confidence in

    performing the given tasks.

    Configuration Skills I can do it confidently

    3

    I can do it but with

    assistance 2

    I am not confident

    1

    1. I can use the different tools for configuration

    2. I can inspect networking devices and connectors

    3. I can create a cross- over and straight through Ethernet cable

    4. I can test the functionality of an Ethernet cable

  • 18

    5. I can assign and configure IP address

    6. I can execute the ipconfig command properly

    7. I can manage to create a peer to peer networking

    8. I can configure Network Interface Card using DHCP

    9. I can enable firewall

    10. I can configure file and printer sharing

    TOTAL

    GRAND TOTAL

    Add all the scores to get the grand total and then divide it by the total

    number of items. Refer to the verbal interpretation on the next page to

    determine your initial configuration ability.

    Numerical and Verbal interpretation

    Numerical Value Verbal Interpretation

    2.51 3.00 Confident 1.76- 2.50 Confident but needs assistance

    1.00 1.75 Not yet Confident

    C. Other appropriate tools

    Check their answers using the answer key on the Feedback portion of this guide.

    IV Know, Process, Reflect and Understand, and Transfer

    LESSON 1. PLAN AND PREPARE FOR CONFIGURATION

    What to KNOW 1.1- Safety Procedures

    Guide the learners in understanding safety procedures and general safety guidelines

    Let learners understand the fire safety guidelines.

  • 19

    1.2- Prepare Tools Used for Configuration

    Guide learners in preparing tools used for configuration.

    Let learners be acquainted and familiarize the different tools used for configuration.

    1.3- Procedures in Using Computer System Configuration Tools

    Guide learners in familiarizing the procedures in using computer system configuration tools.

    What to PROCESS 1.1- Safety Procedures

    Guide learners in performing a peer to peer activity on page 45.

    Instruct the students to get a partner in order to perform the said activity.

    Explain the general directions and show example evidences and picture for a certain circumstances of the activity.

    Task: Peer to Peer activity General Directions: Get a partner to perform the next activity, because this involves a two- person activity. Identify whether the succeeding statements are true or false. You and your partner should gather evidences that make it true and false. Show the effects of not following the safety precautions through a picture presentation. Example: Turn off the power and unplug equipment before opening the case and performing service.

    Answer Picture Presentation

    True

    Evidence Effect

    TRUE OR FALSE

    EVIDENCE PICTURE

    1. A safe workplace is clean, organized and well lit.

    2. Before opening the case and

  • 20

    performing services, one must unplug the power from the source.

    3. It is a best practice that a fire extinguisher and first aid kit must be available in the workplace.

    4. You are allowed to open the power supply or a monitor.

    5. You can eat inside the laboratory.

    1.2- Prepare Tools Used for Configuration

    Let learners classify the different tools used for configuration by answering the MS Configuration Command Classification activity on page 56.

    Instruct the learners to complete the diagram of applet grouping on page 57.

    I. MS Configuration Command Classification

    Directions: There are five functional tabs in MS Configuration utility, namely

    General, Boot, Services, Startup and Tools. Classify the following items

    according to the tabs they belong. Write your answer in a clean paper.

    1. Event Viewer

    2. Safe Boot

    3. List of services that start when computer boots

    4. Make all boot settings permanent

    5. Normal startup

    6. No GUI Boot

    7. OS Boot information

    8. Hide All Microsoft Services

    9. Convenient List of Diagnostic Tools

    10. Base Video

  • 21

    II. Applet Grouping

    Directions: Complete the diagram of various Control Panel Applets with the

    components included in their category.

    1.3- Procedures in Using Computer System Configuration Tools

    The teacher may develop tasks relevant to the procedures in using computer system configuration tools to process the learners understanding on the subject matter.

    What to REFLECT and UNDERSTAND 1.1- Safety Procedures

    Guide learners in deepening their understanding by conducting a research and investigation.

    The teacher must supply the guide questions for the interview

    Research and Investigate

    Directions: Form a group of five members and research on the different

    safety precautions used in computer laboratory. Interview/Observe a

    practitioner while lending a quality service in computer hardware servicing.

    Use a video camera to record the event stressing the safety guidelines and

    procedures in the laboratory. You will be rated according to the following

    rubrics:

  • 22

    Video Documentation of Computer Laboratory Safety Precautions

    Criteria Poor (70-75) Good (76-85) Excellent (86-

    100)

    Content/Informatio

    n (50%)

    Technically sound information

    Coherence of information

    The provided

    information was

    not necessary

    or not sufficient

    to the computer

    laboratory

    safety

    precautions.

    The provided

    information

    was, for the

    most part,

    necessary and

    sufficient to the

    computer

    laboratory

    safety

    precautions.

    The provided

    information was

    necessary and

    sufficient to the

    computer

    laboratory

    safety

    precautions.

    Quality of Video

    (30%)

    Clarity and cohesiveness of the video

    Organization and coherence of ideas

    It lacks clarity

    and/or does not

    present ideas in

    a coherent way.

    Most part is

    well organized,

    clear and

    presents ideas

    in a coherent

    way.

    The video was

    well organized,

    clear and

    presents ideas

    in a coherent

    way.

    Interview on

    practitioner (20%)

    Congruency of questions to the topic

    Clarity of questions

    Questions were

    not congruent

    with the topic

    and were not

    delivered

    clearly.

    Most of the

    questions were

    congruent with

    the topic and

    delivered

    clearly.

    All of the

    questions were

    congruent with

    the topic and

    delivered

    clearly.

    1.2- Prepare Tools Used for Configuration

    The teacher may provide other relevant activity / activities that are suited to the subject matter.

    Let learners conduct a research and exploration to identify the other tools used for computer system and network configuration.

    The teacher must provide a format and specifications for the research that will be used by the learners as their guidelines.

    Rate their performance based on the rubrics for term or research paper.

  • 23

    Task: Research and Explore

    Directions: Conduct a research that identifies other available tools used for

    computer system and network configuration. Use some other resources like

    the World Wide Web and interview a practitioner preferably an IT specialist or

    a computer technician to find out the different tools they use for configuration.

    Your research will be rated according to the following rubrics:

    Rubrics for Term or Research Paper

    Qualities &

    Criteria Poor (0-74)

    Good (75-

    79)

    Very Good

    (80-89)

    Excellent

    (90-100)

    Format/Layout

    (15%)

    Presentation of the text

    Structuring of text

    Requirements of length, font and style followed

    Followed

    poorly the

    requiremen

    ts related to

    format and

    layout.

    Some

    format and

    layout

    related

    requiremen

    ts were

    met.

    Most format

    and layout

    related

    requiremen

    ts were

    met.

    All the

    requiremen

    ts related to

    format and

    layout were

    strictly

    followed.

    Content/Informat

    ion (50%)

    All elements of the topics are addressed

    The information is technically sound

    Information based on careful research

    Coherence of information

    The

    research

    was not

    objective

    and poorly

    addresses

    the issues

    referred in

    the

    proposed

    topic.

    The

    provided

    information

    was not

    necessary

    or not

    sufficient to

    The

    research

    was

    objective

    and for

    some part

    addresses

    an in depth

    analysis

    The

    provided

    information

    was, for

    some part,

    necessary

    and

    sufficient to

    discuss

    The

    research

    was

    objective

    and for the

    most part

    addresses

    an in depth

    analysis of

    most issues

    referred in

    the

    proposed

    topic.

    The

    provided

    information

    was, for the

    The

    research

    was

    objective

    and

    addresses

    with an in

    depth

    analysis all

    the issues

    referred in

    the

    proposed

    topic.

    The

    provided

    information

    was

  • 24

    discuss

    these

    issues.

    these

    issues.

    most part,

    necessary

    and

    sufficient to

    discuss

    these

    issues.

    necessary

    and

    sufficient to

    discuss

    these

    issues.

    Quality of

    Writing (25%)

    Clarity and cohesiveness of sentences and paragraphs

    No errors in spelling, grammar and use of English

    Organization and coherence of ideas

    The essay

    was not

    well written,

    and

    contains

    many

    spelling

    errors,

    and/or

    grammar

    errors

    and/or use

    of English

    errors.

    It lacks

    clarity

    and/or does

    not present

    ideas in a

    coherent

    way.

    The essay

    was well

    written for

    some part,

    without

    spelling,

    grammar or

    use of

    English

    errors.

    The essay

    is for some

    part well

    organized,

    clear and

    presents

    ideas in a

    coherent

    way.

    The essay

    was well

    written for

    the most

    part,

    without

    spelling,

    grammar or

    use of

    English

    errors.

    The essay

    is for the

    most part

    well

    organized,

    clear and

    presents

    ideas in a

    coherent

    way.

    The essay

    was well

    written from

    start to

    finish,

    without

    spelling,

    grammar or

    use of

    English

    errors.

    The essay

    was well

    organized,

    clear and

    presents

    ideas in a

    coherent

    way.

    References

    (10%)

    Soundness of references

    References

    were not

    appropriatel

    y used and

    cited.

    Some of

    the

    references

    were

    appropriatel

    y used and

    cited.

    Most of the

    references

    were

    appropriatel

    y used and

    cited.

    All of the

    references

    were

    appropriatel

    y used and

    cited.

  • 25

    1.3- Procedures in Using Computer System Configuration Tools

    The teacher shall craft different tasks to enrich learners understanding on the procedures of using different computer system configuration tools.

    The teacher may assign learners to apply the result of their research about different computer system configuration tools through a demonstration.

    What to TRANSFER 1.1- Safety Procedures

    Let learners showcase their understanding on safety procedures through a role playing using the collected and collaborated information gathered from the research and investigation activity.

    Rate the learners performance using the rubric for role playing provided on page 47 of Learners Material.

    Task: Application of Safety Procedures while accomplishing a task

    Directions: After the interview and observation with a practitioner, your group

    will showcase what you have learned through a role playing. You will be rated

    base on the Rubrics written below:

    Rubrics for Role Playing

    Criteria Excellent 4

    Good 3

    Fair 2

    Weak 1

    Content (40%) -Conveys full understanding of the content

    Enthusiasm (10%) -Facial expression and body language generates strong enthusiasm

    Interest and Purpose (10%) -Displays interesting purpose

    Speak Clearly (10%) -Group members speaks clearly at all

  • 26

    times

    Volume (10%) -Loud volume

    Preparedness (10%) -Group is prepared with props and costumes

    Cooperation (10%) -displays teamwork

    1.2- Prepare Tools Used for Configuration

    Have learners perform an oral presentation of their collected information gathered from the research and exploration activity. Rate their performance through the rubric for oral presentation.

    Task : Oral Presentation

    Directions: After the thorough research and exploration, you have to present

    your work individually in an oral manner in front of the class. Your

    performance will be rated base on the rubric provided in this section.

    Rubric for Oral Presentation

    CRITERIA B

    (70- 74) D

    (75-79)

    AP (80-84)

    P (85-89)

    A (90-100)

    1. Gave an interesting introduction

    2. Presented clear explanation of topic

    3. Presented information in logical manner

    4. Used complete sentence

    5. Offered a concluding summary

    6. Spoke clearly, correctly, distinctly, and confidently

  • 27

    7. Maintained eye contact

    8. Maintained acceptable posture.

    9. Utilized audio-visual aids

    10. Handled questions and comments confidently

    Total

    Grand Total

    1.3- Procedures in Using Computer System Configuration Tools

    Let learners perform the windows registry backup and recovery activity on page 65 of Learners Material.

    Rate learners performance using the rubrics for Registry Backup and Recovery.

    Task: Windows Registry Backup and Recovery

    Rubrics for Registry Backup and Recovery

    CRITERIA Excellent 4

    Good 3

    Fair 2

    Poor 1

    Safety Procedures (15%) -Applied / manifested safety precautions while working

    Adherence to the Procedures (30%) -Followed the procedures systematically

    Workmanship (15%) -Had organized materials and tools while accomplishing the task and has time management

    Quality of work (40%) -the windows registry was fully backed up

  • 28

    LESSON2. CONFIGURE COMPUTER SYSTEM AND NETWORK

    What to KNOW

    Introduce the concept of system configuration to the learners by citing circumstances related to configuration.

    2.1- Safety Precautions Related to Networks

    The teacher may append topics on safety precautions in system and network configuration.

    Guide the learners in recognizing the safety precautions related to networks.

    2.2- Networking Devices, Media and Connector

    Review the different networking devices, media and connector.

    Discuss and show visuals of the common types of network cable.

    Assist learners in familiarizing the different Ethernet cable.

    Discuss and demonstrate the procedures in fabricating Ethernet cables.

    2.3- Internet Protocols

    Introduce Internet Protocols and discuss the commonly used internet protocols.

    Discuss IP address and its five classes.

    Let learners be familiar with subnet mask by discussing the theory and types of it.

    Discuss the concept IP config command and demonstrate procedures in using it.

    Discuss and demonstrate the procedures in assigning a static IP address of a computer.

    The teacher may use differentiated strategies to discuss and demonstrate the procedures in assigning a dynamic IP address of a computer.

    Introduce the ping command and demonstrate the procedure in using the ping command.

    2.4- Peer-to-Peer and Client/server Network

    Let learners discover the difference between peer to peer and client / server network.

    Demonstrate the essential procedures in setting up a peer to peer network in Windows XP or Windows 7 computer system.

    The procedure in setting up a client / server network is not included in the learning module. The teacher must provide supplementary resources to obtain the procedures and have them demonstrated in the class.

  • 29

    2.5- Network Security

    Facilitate brain storming activity on the class. The learners must be engaged in discovering the importance of security in computer system and network and the different security attacks.

    Discuss and demonstrate the different security procedures. 2.6- File and Printer Sharing

    Discuss the concept of file and printer sharing, cite example scenario where it has been used.

    Hook learners interest by demonstrating the procedures in sharing resources and accessing shared resources as well as the procedures in printer sharing.

    What to PROCESS 2.1- Safety Precautions Related to Networks

    The teacher is suggested to craft appropriate activities to process learners understanding relevant to safety precautions in system and network configuration.

    2.2- Networking Devices, Media and Connector

    Let learners answer the criss- cross puzzle on page 86.

    Task: Criss- Cross Puzzle

    Direction: Complete the criss- cross puzzle and familiarize the cables being

    described.

    CABLES

  • 30

    Across 1. each pair of wires is wrapped in metallic foil 3. one or more optical fibers enclosed in a sheath or jacket 5. used to connect two devices directly 6. cable that has two or four pairs of wires 7. the standard cable used for almost all purposes Down 1. cable that has a very thin core 2. cable that has a thicker core 4. used for telephone communications and Ethernet networks 5. copper-cored cable

    2.3- Internet Protocols

    Instruct learners to accomplish the worksheet for the task entitled Protocols.

    Task: Protocols

    Direction: In this worksheet, you will write the name of the protocol and the

    default port(s) for each protocol definition in the table.

    Be prepared to discuss your answers.

    Protocol Definition Protocol Default Port(s)

    Provides connections to computers over a TCP/IP network

    Sends e-mail over a TCP/IP network

    Translates URLs to IP address

    Transports Web pages over a TCP/IP network

    Automates assignment of IP address on a network

    Securely transports Web pages over a TCP/IP network

    Transports files over a TCP/IP network

    The teacher shall provide several IP address for the task entitled Identifying IP address classes. It must be written in the board or any visuals available. Give the directions and instruct the learners to accomplish the worksheet for the said activity.

  • 31

    II. Identifying IP Address Classes

    Direction: In this worksheet, your teacher will write several IP addresses with

    their appropriate subnet masks on the board. You will copy the IP address

    and Subnet Mask. You will write which IP Address Class is appropriate in the

    IP Address Class column in the chart below. An example has been provided

    for you.

    Be prepared to discuss the IP Address Class you select.

    IP Address Subnet Mask IP Address Class

    10.0.0.0 255.0.0.0 A

    2.4- Peer-to-Peer and Client/server Network

    Ask learners to compare peer-to-peer and client / server network. Let them accomplish the table for task comparison on page 125.

    Task: Comparison

    Direction: Using the table below, cite the features of peer-to-peer and client

    /server network that describes their difference.

    Peer-to-peer Network Client/Server Network

    1.

    2.

    3.

    4.

    5.

  • 32

    2.5- Network Security

    Ask learners to take the short quiz on pages 138-139 of their Learning Module.

    Short Quiz

    Test I. Modified true or false

    Directions: Write SECURITY if the underlined word on the subsequent

    statement makes it true and VIRUS if it is makes the statement a false one

    then write the correct term / word to correct it. (2 points each)

    1. Computer and network security help keep data and equipment safe.

    2. A technicians secondary responsibilities include data and network

    security.

    3. Threats to security can come from inside and outside the organization.

    4. Computer viruses are created and sent by attackers who have malicious

    intent.

    5. A virus is transferred to another computer through e-mail, file transfer and

    instant messaging.

    Test II. Matching Type

    Direction: Match column A with column B in order to identify the term / word

    being described.

    A B

    1. when an employee intends to cause damage 2. when user damages data or equipment unintentionally 3. attached to small pieces of computer code, software and documents 4. a self-replicating program that is harmful to network 5. it is technically a worm 6. software designed to detect, disable and remove viruses 7. it involves using codes and ciphers 8. a way of protecting a computer from intrusion through the ports 9. an encryption system that protects data 10. data being transported on a network

    a. Accidental threats b. Antivirus software c. Data encryption d. Firewall e. Malicious threats f. Traffic g. Trojan horse h. Virus i. VPN j. WPA k. WEP l. Worm

  • 33

    Test III. Acrostic

    Direction: Give the meaning of the acronyms given below:

    1. VPN- ________________________________________

    2. SSID- ________________________________________

    3. WEP- ___________________________________________

    4. WPA- ___________________________________________

    5. WTLS- __________________________________________

    2.6- File and Printer Sharing

    Let learners express their deep comprehension through an essay writing task on page 147.

    Task: Essay Writing

    Direction: Express your deep comprehension about the subject matter by

    constructing a minimum of five sentence response per item.

    1. Cite the importance of file sharing and give an example scenario where its

    worth was proven.

    ______________________________________________________________

    ______________________________________________________________

    ______________________________________________________________

    ______________________________________________________________

    ______________________________________________________________

    1. Cite the advantages and disadvantages of printer sharing.

    Advantages Disadvantages

    Example Situation Example Situation

  • 34

    What to REFLECT and UNDERSTAND 2.1- Safety Precautions Related to Networks

    Teacher may provide variation of activities for this lesson to process learners understanding on the subject matter

    2.2- Networking Devices, Media and Connector

    Guide learners in deepening their understanding by watching the video presentations using the URLs provided on page 87.

    After the video presentations, instruct learners to answer the guide questions on page 88 in order to process their understanding on the subject matter.

    The teacher shall provide additional / contingency activities if in case the learners encountered technical problems in opening the URL in this section.

    Task: Video Presentation

    To watch the video presentations just type in the following URL:

    1) http://www.professormesser.com/n10-005/copper-connectors/

    2)http://www.professormesser.com/n10-005/copper-connectors/

    3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/

  • 35

    Here are the guide questions:

    1. What are the different type of fiber connectors and cite their advantages

    and disadvantages?

    2. List down the different types of connectors.

    3. What are the characteristics of UTP, STP and coaxial cable?

    2.3- Internet Protocols

    Enrich learners understanding by instructing them to watch online video presentations about IP address and subnetting. Let them copy the essential URL for the said presentations and direct them to answer the activity entitled reflection on the video presentation.

    Task: Video Presentations

    General Directions: To deepen your understanding with regard to the

    Internet Protocols, IP Address and subneting, utilize the Internet and

    the website www.professormesser.com, watch and learn from the

    video presentations. Use the URLs below:

    1. http://www.professormesser.com/n10-005/binary-math-2/

    2. http://www.professormesser.com/n10-005/ip-classes/

  • 36

    3. http://www.professormesser.com/n10-005/networkingprotocols/

    4. http://www.professormesser.com/n10-005/subnetting/

    Reflection on the video presentations

    Direction: Answer the essential questions below according to the video

    presentations you had watched. Write your answer in a clean sheet of paper.

    1. What are the procedures involved in calculating IP address and the

    procedures in converting IP address to binary and vise versa?

    2. What are the different IP Classes? Discuss each briefly and give

    examples for each.

    3. What are the distinguished Internet Protocols? Describe each.

    4. What are the necessary procedures in calculating subnet mask or

    simply subneting? Show an example solution for the calculation.

    2.4- Peer-to-Peer and Client/server Network

    Increase learners comprehension on the advantages and disadvantages of peer-to-peer network by using different resources. Let them present their study in front of the class and rate them according to the rubrics for research study.

  • 37

    Task: Peer-to-peer study

    Directions: Have a partner. Using different references available such as

    articles, books, internet and publications, investigate and search for the

    advantages and disadvantages of peer-to-peer network. You will present your

    readings in front of the class and you will be rated according to the rubrics for

    research and rubrics for oral presentation.

    Rubrics for Research Study

    Qualities &

    Criteria Poor (0-74)

    Good (75-

    79)

    Very Good

    (80-89)

    Excellent

    (90-100)

    Format/Layout

    (15%)

    Presentation of the text

    Structuring of text

    Requirements of length, font and style followed

    Followed

    poorly the

    requiremen

    ts related to

    format and

    layout.

    Some

    format and

    layout

    related

    requiremen

    ts were

    met.

    Most format

    and layout

    related

    requiremen

    ts were

    met.

    All the

    requiremen

    ts related to

    format and

    layout were

    strictly

    followed.

    Content/Informat

    ion (50%)

    All elements of the topics are addressed

    The information is technically sound

    Information based on careful research

    Coherence of information

    The

    research

    was not

    objective

    and poorly

    addresses

    the issues

    referred in

    the

    proposed

    topic.

    The

    provided

    information

    was not

    necessary

    or not

    sufficient to

    The

    research

    was

    objective

    and for

    some part

    addresses

    an in depth

    analysis

    The

    provided

    information

    was, for

    some part,

    necessary

    and

    sufficient to

    discuss

    The

    research

    was

    objective

    and for the

    most part

    addresses

    an in-depth

    analysis of

    most issues

    referred in

    the

    proposed

    topic.

    The

    provided

    information

    was, for the

    The

    research

    was

    objective

    and

    addresses

    with an in-

    depth

    analysis all

    the issues

    referred in

    the

    proposed

    topic.

    The

    provided

    information

    was

  • 38

    discuss

    these

    issues.

    these

    issues.

    most part,

    necessary

    and

    sufficient to

    discuss

    these

    issues.

    necessary

    and

    sufficient to

    discuss

    these

    issues.

    Quality of

    Writing (25%)

    Clarity and cohesiveness of sentences and paragraphs

    No errors in spelling, grammar and use of English

    Organization and coherence of ideas

    The essay

    was not

    well written,

    and

    contains

    many

    spelling

    errors,

    and/or

    grammar

    errors

    and/or use

    of English

    errors.

    It lacks

    clarity

    and/or does

    not present

    ideas in a

    coherent

    way.

    The essay

    was well

    written for

    some part,

    without

    spelling,

    grammar or

    use of

    English

    errors.

    The essay

    is for some

    part well

    organized,

    clear and

    presents

    ideas in a

    coherent

    way.

    The essay

    was well

    written for

    the most

    part,

    without

    spelling,

    grammar or

    use of

    English

    errors.

    The essay

    is for the

    most part

    well

    organized,

    clear and

    presents

    ideas in a

    coherent

    way.

    The essay

    was well

    written from

    start to

    finish,

    without

    spelling,

    grammar or

    use of

    English

    errors.

    The essay

    was well

    organized,

    clear and

    presents

    ideas in a

    coherent

    way.

    References

    (10%)

    Soundness of references

    References

    were not

    appropriatel

    y used and

    cited.

    Some of

    the

    references

    were

    appropriatel

    y used and

    cited.

    Most of the

    references

    were

    appropriatel

    y used and

    cited.

    All of the

    references

    were

    appropriatel

    y used and

    cited.

  • 39

    Oral Presentation Rubric

    Rubrics for Oral Presentation

    CRITERIA B

    (70- 74) D

    (75-79)

    AP (80-84)

    P (85-89)

    A (90-100)

    1. Gave an interesting introduction

    2. Presented clear explanation of topic

    3. Presented information in logical manner

    4. Used complete sentence

    5. Offered a concluding summary

    6. Spoke clearly, correctly, distinctly, and confidently

    7. Maintained eye contact

    8. Maintained acceptable posture.

    9. Utilized audio-visual aids

    10. Handled questions and comments confidently

    Total

    Grand Total

    2.5- Network Security

    Ask learners to accomplish research firewalls task on page 139 and instruct them to use supplementary references such as internet, newspaper etc., to gather information.

  • 40

    Task: Research Firewalls

    Direction: In this activity, you will use the Internet, a newspaper, or a local

    store to gather information about hardware and software firewalls.

    Company/Hardware Name

    Website URL

    Cost Subscription Length (Month/Year/Lifetime)

    Hardware Features

    1. Using the Internet, research two different hardware firewalls. Based on your research, complete the table below.

    2. Which hardware firewall would you purchase? List reasons for your

    selection.

    3. Using the Internet, research two different software firewalls. Based on

    your research, complete the table below.

    Company/Software Name

    Website URL

    Cost Subscription Length (Month/Year/Lifetime)

    Software Features

    4. Which software firewall would you purchase? List reasons for your

    selection.

    2.6- File and Printer Sharing

    Instruct learners to do the Read and Examine task on page 148. Ask them to use supplementary references and inform them to prepare for an oral presentation.

    Prepare a rubric for the oral presentation. Task: Read and examine

    Direction: Examine these topics carefully to deepen your understanding

    about sharing a printer, read books /other references. Prepare for an oral

    presentation.

    1. What is a print server?

    2. What are the functions of a print server?

    3. What are the different types of print servers? Describe each.

  • 41

    What to TRANSFER 2.2- Networking Devices, Media and Connector

    Guide the learners in creating their own Ethernet cable by stating the general directions, materials and tools needed and by discussing the procedures for the said activity.

    Inform the learners about the rubrics to be used in order to rate their performance (rubrics is on page 90).

    Task: Create your own Ethernet Cable

    Directions: Prepare the following tools and materials in fabricating your own

    cross over and straight- through cables.

    Materials:

    1) 6 meters Ethernet Cable Category 5e or Cat5e- standard wire for

    cabling;

    2) RJ45 crimpable connectors for Cat5e;

    Tools:

    3) RJ45 Crimping tool;

    4) Wire cutter, stripper or pliers; and

    5) Ethernet cable Tester / LAN Tester

    Take Note: Be careful when using the tools.

    You just need to follow the procedures cited in this module and apply

    the safety precautions to avoid injury or any unwanted incident. You will be

    given 30 minutes to complete the task. You will be rated according to the

    performance rubric.

    Procedures:

    1. Cut into the plastic sheath 1 inch from the end of the cut cable. The

    crimping tool has a razor blade that will do the trick with practice.

    2. Unwind and pair the similar colors.

    3. Pinch the wires between your fingers and straighten them out as

    shown. The color order is important to get correct.

    4. Use scissors to make a straight cut across the wires 1/2 Inch from the

    cut sleeve to the end of the wires.

    5. Push the wires into the connector. Note the position of the blue plastic

    shielding. Also note how the wires go all the way to the end.

  • 42

    6. A view from the top. All the wires are all the way in. There are no short

    wires.

    7. Crimping The Cable carefully place the connector into the Ethernet

    Crimper and cinch down on the handles tightly. The copper splicing

    tabs on the connector will pierce into each of the eight wires. There is

    also a locking tab that holds the blue plastic sleeve in place for a tight

    compression fit. When you remove the cable from the crimper, that end

    is ready to use.

    8. For a standard "Straight Through" cable, repeat all steps and wire color

    order on the other end of cable. For a cross-over cable, the other end

    will have a different color order as shown by the crossover picture

    above.

    9. Make sure to test the cables before installing them. An inexpensive

    Ethernet cable tester does this quite well.

    Performance Rubrics for

    Creating a Cross- Over and Straight Through Ethernet Cables

    CRITERIA Excellent 4

    Good 3

    Fair 2

    Poor 1

    Safety Procedures (15%) -Applied / manifested safety precautions while working

    Adherence to the Procedures (30%) -Followed the procedures systematically

    Workmanship (15%) -Organized materials and tools while accomplishing the task and has time management

  • 43

    Quality of Product (40%) -produced a fully functional Ethernet Cable

    2.3- Internet Protocols

    The teacher may group the learners with two or three members for the activity entitled Configure an Ethernet NIC using DHCP. Give the details of the activity such as materials, equipment, tools and procedures to be used. Inform the learners that along with the ongoing activity, they need to answer the given questions next to the procedures in a clean sheet of paper. Check and rate their performance using the configuration rubrics on page 106.

    Task: Configure an Ethernet NIC to use DHCP

    Direction: You will configure an Ethernet NIC to use DHCP to obtain an IP

    address. You need to follow the procedures given below and apply safety

    precautions in accomplishing this task. While doing the activity you have to

    answer questions written after every procedure. Write your answer in a clean

    sheet of paper. Your performance will be rated based on the performance

    rubrics.

    Configuration Rubrics

    Criteria Poor (0-80)

    Good (80-90)

    Excellent (90-100)

    Proper Configuration (30 %) (the configured hardware was properly configured according to job specification)

    Adherence to the Procedures (30%) (The specified job was done by following the procedures. Safety measures were observed during the activity)

    Quality of Work (30%) (The device was configured properly)

  • 44

    Comprehension (10%) (Interview / Guide questions were answered correctly according to the job requirements)

    Recommended Equipment

    Linksys 300N router

    A Computer running Window XP Professional

    Ethernet patch cable

    Procedures:

    Step 1

    Plug one end of the Ethernet patch cable into Port 1 on the back of

    the router.

    Plug the other end of the Ethernet patch cable into the network port on

    the NIC in your computer.

    Plug in the power cable of the router if it is not already plugged in.

    Turn on your computer and log on to Windows as an administrator.

    Click start

    Right-click My Network Places, and then choose Properties.

    The Network Connections window appears.

    Step 2

    Right-click Local Area Connection, and then choose Properties.

    The Local Area Connection Properties window appears.

  • 45

    Activity Questions:

    1. What is the name and model number of the NIC in the Connect

    using: field?(Answers may vary)

    2. What are the items listed in the This connection uses the

    following items: field? (Answers may vary but must include

    Internet Protocol (TCP/IP)

    Step 3

    Choose Internet Protocol (TCP/IP).

    Click Properties.

    The Internet Protocol (TCP/IP) Properties window appears.

    Activity Question:

    3. What is the IP address, Subnet mask, and Default gateway

    listed in the fields of the Use the following IP address: area?

    Answers may vary. If the computer is configured to obtain an IP

  • 46

    address automatically, there will be no information in the fields.

    Click the Obtain an IP address automatically radio button.

    Click OK. The Internet Protocol (TCP/IP) Properties window closes.

    Click OK.

    Restart your computer.

    Step 4

    Log on to Windows as an administrator.

    Check the lights on the back of the NIC. These lights will blink when

    there is network activity.

    Choose Start > Run....

    Type cmd and click OK.

  • 47

    Type ipconfig/all, and then press the Enter key.

    Activity Questions:

    1. What is the IP address and subnet mask of the Ethernet Adapter

    Local Area Network Connection? Answers may vary.

    2. What is the IP address of the DHCP server? Answers may vary.

    3. On what date was the Lease Obtained? Answers may vary.

    4. On what date does the Lease Expire? Answers may vary.

    Task 2

    Configure Wireless Router

    Directions: Configure and test the wireless settings on the

    LinksysWRT300N.

    Recommended Equipment

    A computer with Windows XP Professional

    A Wireless NIC installed

    An Ethernet NIC installed

    Linksys WRT300N Wireless Router

    Ethernet patch cable

    Step 1

    Connect the computer to one of the Ethernet ports on the wireless router

    with an Ethernet patch cable.

    Plug in the power of the wireless router. Boot the computer and log in as

    an administrator.

    Step 2

    Choose start > Run, and type cmd. Press the Return key.

    Type ipconfig.

    What is the default gateway for the computer?

  • 48

    Step 3

    Open Internet Explorer. Type 192.168.1.1 in the Address field, and

    then press Return.

    The Connect to 192.168.1.1 window appears.

    Type admin in the Password: field.

    The Setup screen appears.

    Step 4

    Click the Wireless tab.

    Choose Mixed in the Network Mode: drop-down box.

  • 49

    Type CHS# in the Network Name (SSID): field, where # is the number

    assigned by your instructor.

    Click Save Settings.

    The Settings are successful screen appears.

    Click Continue, and then close the browser window.

    Step 4

    Unplug the Ethernet patch cable from the rear of the computer.

    Choose start, and then right-click My Network Places. Choose

    Properties.

    Double-click the wireless adapter, and then select View Wireless

    Networks.

    Choose CHS, and then click the Connect button.

    Open Internet Explorer, and then connect to the wireless router.

    Log into the wireless router.

    Close Internet Explorer.

  • 50

    2.4- Peer-to-Peer and Client/server Network

    Let the learners perform the hands- on activity setting up a peer-to-peer and client / server network. Rate them according to the performance indicators provided on page 128.

    Hands- on Activity

    Directions: Follow and perform the prescribed procedures in setting up a

    peer-to-peer and client/server network for Windows XP and Windows 7. You

    will be rated base on the performance indicators below:

    Performance Indicators for Setting- up a peer-to-peer and client/server

    network

    Indicators Excellent 4

    Good 3

    Fair 2

    Poor 1

    Safety Procedures (15%) -Applied / manifested safety precautions while working

    Adherence to the Procedures (30%) -Followed the procedures systematically

    Workmanship (15%) -Organized materials and tools while accomplishing the task and has time management

    Quality of Service (40%) -Had set- up a fully functional peer-to-peer and client/server network.

  • 51

    2.5- Network Security

    Assist learners in performing the task entitled Configure Windows XP Firewall. Ask them to answer the essential questions along with the procedures given in the activity.

    In order to validate their performance, the teacher must construct a rubric appropriate to the activity.

    Task: Configure Windows XP Firewall

    Direction: In this laboratory activity you will explore the Windows XP Firewall and configure some advanced settings. There are essential questions that you need to answer while performing the activity.

    Step 1

    Navigate to the Windows XP Firewall:

    Start > Control Panel > Security Center

    The Firewall indicator shows the status of the firewall. The normal

    setting is ON.

    Access the controller for the firewall by clicking Windows Firewall at

    the bottom of the window.

    Step 2

  • 52

    Essential Questions:

    In the space below, state why turning off the Windows Firewall is

    not advised.

    Step 3

    From the Windows Firewall control menu select the Exceptions tab.

    Programs and services that Windows Firewall is not blocking will be

    listed with a checkmark.

    You can add applications to this list. This may be necessary if your

    customer has an application that requires outside communications but

    for some reason the Windows Firewall cannot perform the

    configuration automatically. You must be logged on to this computer as

    an administrator to complete this procedure.

  • 53

    Essential Question:

    Creating too many exceptions in your Programs and Services file

    can have negative consequences. Describe a negative consequence of

    having too many exceptions. _______________________________________________________________________

    _______________________________________________________________________

    _______________________________________________________________________

    Step 4

    From the Windows Firewall control menu select the Advanced tab to

    view the Network Connection Settings. Network Connection

    Settings displays the different connections configured for your

    computer.

    Click the Settings button in the Network Connection Settings area.

    The Advanced Settings window has two tabs: Services and ICMP.

    Click the Services tab.

    Essential Question:

    In the space below, list the services that are available.

    ___________________________________________________________

    ___________________________________________________________

    ___________________________________________________________

    Step 5

    There are many applications that users do not normally see that also

    need to get through the Windows Firewall to access your computer.

    These are the network level commands that direct traffic on the

    network and the Internet.

  • 54

    Under the ICMP heading, click the Settings button. You will see the

    menu where ICMP exceptions are configured.

    In the example here, allowing incoming echo requests is what allows

    network users to ping your computer to determine if it is present on

    the network and how fast information travels to and from it.

    Essential Question:

    In the space below, list the requests for information that your computer will

    respond to. _______________________________________________________________________

    _______________________________________________________________________

    _______________________________________________________________________

    2.6- File and Printer Sharing

    Instruct learners to perform the share a folder, share a printer and set permission task on pages 148-154.

    Explain the directions and criteria for their performance.

    Use the performance criteria on page 154 of the Learning Module to rate the learners.

    Task: Share a Folder, Share a Printer, and Set Share Permissions

    Direction: In this activity, you will create and share a folder, share a printer,

    and set permissions for the shares. You will be given 30 minutes to complete

    the task. You will be rated base on the performance criteria provided below.

    Recommended Equipment

    Two computers running Windows XP Professional that are directly connected to each other or through a switch or hub.

    A printer installed on one of the two computers

  • 55

    Procedur